Busy Architect's Guide to the Open Web Application Security Project (OWASP)

ted@tedneward.com | Blog: http://blogs.tedneward.com | Twitter: tedneward | Github: tedneward | LinkedIn: tedneward

OWASP (Open Web Application Security Project)

Top Ten Web Application Vulnerabilities (2013)

OWASP Top Ten - 2013

The List

OWASP Top Ten - 2013

The List

OWASP Top Ten - 2013

A1. Injection

OWASP Top Ten - 2013

A1. Injection

OWASP Top Ten - 2013

A2. Broken Auth/Session Mgmt

OWASP Top Ten - 2013

A2. Broken Auth/Session Mgmt

OWASP Top Ten - 2013

A3. Cross-Site Scripting (XSS)

OWASP Top Ten - 2013

A3. Cross-Site Scripting (XSS)

OWASP Top Ten - 2013

A4. Insecure Direct Object Reference

OWASP Top Ten - 2013

A4. Insecure Direct Object Reference

OWASP Top Ten - 2013

A5. Security Misconfiguration

OWASP Top Ten - 2013

A5. Security Misconfiguration

OWASP Top Ten - 2013

A6. Sensitive Data Exposure

OWASP Top Ten - 2013

A6. Sensitive Data Exposure

OWASP Top Ten - 2013

A6. Sensitive Data Exposure

OWASP Top Ten - 2013

A7. Missing Function-Level Access Control

OWASP Top Ten - 2013

A7. Missing Function-Level Access Control

OWASP Top Ten - 2013

A8. Cross-Site Request Forgery (CSRF)

OWASP Top Ten - 2013

an application permits the user to submit a state-changing request that does not include anything secret

http://~/app/transferFunds?amount=1500&destinationAcct=452674

Attacker constructs a request that will transfer money from victim's account to the attacker's account. Then attacker embeds this attack in an image request or iframe stored on various sites under the attacker's control.

<img src="http://~/app/transferFunds?amount=1500&amp;destinationAcct=452674" width="0" height="0" />

OWASP Top Ten - 2013

A8. Cross-Site Request Forgery (CSRF)

OWASP Top Ten - 2013

A9. Using Known Vulnerable Components

OWASP Top Ten - 2013

A9. Using Known Vulnerable Components

OWASP Top Ten - 2013

A10. Unvalidated Redirects/Forwards

OWASP Top Ten - 2013

A10. Unvalidated Redirects/Forwards

OWASP (Open Web Application Security Project)

Resources

OWASP Resources

Websites** OWASP main--- https://www.owasp.org/index.php/Main_Page** OWASP Top Ten Web App Risks--- https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project** OWASP Top Ten Cheat Sheet--- https://www.owasp.org/index.php/OWASP_Top_Ten_Cheat_Sheet** OWASP Top Ten Mobile App Risks--- https://www.owasp.org/index.php/OWASP_Mobile_Security_Project** OWASP Developer's Guide Project--- https://www.owasp.org/index.php/OWASP_Guide_Project

Summary

Where to go from here

Credentials

Who is this guy?